Author pages are created from data sourced from our academic publisher partnerships and public sources.
Share This Author
Towards Understanding Man-in-the-middle Attacks on IEC 60870-5-104 SCADA Networks
This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications, covering modification and injection of commands, and details capture and replay attacks.
Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations
- Boojoong Kang, P. Maynard, T. Strasser
- Engineering, Computer ScienceIEEE 20th Conference on Emerging Technologies…
- 26 October 2015
An investigation of attacks against the manufacturing message specification of IEC 61850, which is expected to become one of the most widely used communication services in Smart Grids, is addressed to help understand the potential for attacks, and to aid the development and testing of cyber security solutions.
Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid
- R. Khan, P. Maynard, K. McLaughlin, D. Laverty, S. Sezer
- Engineering, Computer ScienceICS-CSR
- 23 August 2016
This paper presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems and analyzes cyber threats of Black energy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid.
Censorship and Surveillance in the Digital Age: The Technological Challenges for Academics
Methods which can be used for digital censorship and surveillance as well as ways to resist them are systematically explored and a discussion about the inclusion of these tools within academia and students’ curricula is stimulated.
An Open Framework for Deploying Experimental SCADA Testbed Networks
A scalable framework for automatically deploying locally (or remotely) a number of virtual machines that replicate a Supervisory Control And Data Acquisition (SCADA) network is proposed. This…
Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction
This paper provides a well structured model which can be used for future analysis of Duqu 2.0 based on the latest information sourced from formal and informal sources.
Secure Communications in Smart Grid: Networking and Protocols
Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks
We describe a new class of packet injection attacks called Man-on-the-Side Attacks (MotS), previously only seen where state actors have "compromised" a number of telecommunication companies. MotS…
Using Application Layer Metrics to Detect Advanced SCADA Attacks
A collection of network application layer metrics are proposed to provide a greater insight into SCADA communications and are able to detect a range of adversary capabilities which goes beyond previous literature in the SCADA domain.
Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems
This work considers together a comprehensive set of real-world cyber-attacks with the purpose of deriving a set of common features focusing particularly on the process control network, and focuses on the methods of intrusion rather than the identification of actors.